{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T03:04:37Z","timestamp":1769742277280,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,30]],"date-time":"2015-08-30T00:00:00Z","timestamp":1440892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,30]]},"DOI":"10.1145\/2786805.2786846","type":"proceedings-article","created":{"date-parts":[[2015,8,26]],"date-time":"2015-08-26T16:48:13Z","timestamp":1440607693000},"page":"333-344","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["On the use of delta debugging to reduce recordings and facilitate debugging of web applications"],"prefix":"10.1145","author":[{"given":"Mouna","family":"Hammoudi","sequence":"first","affiliation":[{"name":"University of Nebraska-Lincoln, USA"}]},{"given":"Brian","family":"Burg","sequence":"additional","affiliation":[{"name":"University of Washington, USA"}]},{"given":"Gigon","family":"Bae","sequence":"additional","affiliation":[{"name":"University of Nebraska-Lincoln, USA"}]},{"given":"Gregg","family":"Rothermel","sequence":"additional","affiliation":[{"name":"University of Nebraska-Lincoln, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,8,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338966.2336799"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958253"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806840"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390662"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2525528.2525533"},{"key":"e_1_3_2_1_6_1","volume-title":"Software fault identification via dynamic analysis and machine learning. Master\u2019s thesis","author":"Brun Y.","year":"2003","unstructured":"Y. Brun . Software fault identification via dynamic analysis and machine learning. Master\u2019s thesis , Massachusetts Institute of Technology , August 2003 . Y. Brun. Software fault identification via dynamic analysis and machine learning. Master\u2019s thesis, Massachusetts Institute of Technology, August 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501988.2502050"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001447"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.940726"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.10"},{"key":"e_1_3_2_1_11_1","volume-title":"WAD","author":"Cleve H.","year":"2000","unstructured":"H. Cleve and A. Zeller . Finding failure causes through automated testing . In WAD , August 2000 . H. Cleve and A. Zeller. Finding failure causes through automated testing. In WAD, August 2000."},{"key":"e_1_3_2_1_12_1","volume-title":"MTI","author":"Cornelis F.","year":"2003","unstructured":"F. Cornelis , A. Georges , M. Christiaens , M. Ronsse , T. Ghesquiere , and K. de Bosschere . A taxonomy of execution replay systems . In MTI , 2003 . F. Cornelis, A. Georges, M. Christiaens, M. Ronsse, T. Ghesquiere, and K. de Bosschere. A taxonomy of execution replay systems. In MTI, 2003."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348250.1348254"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629586"},{"key":"e_1_3_2_1_15_1","first-page":"395","volume-title":"CQS","author":"Peifeng","year":"2008","unstructured":"Peifeng H., Zhenyu Z., W. K. Chan , and T. H. Tse . Fault localization with non-parametric program behavior model . In CQS , pages 385\u2013 395 , Aug 2008 . Peifeng H., Zhenyu Z., W. K. Chan, and T. H. Tse. Fault localization with non-parametric program behavior model. In CQS, pages 385\u2013395, Aug 2008."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499370.2462167"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581397"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.29"},{"key":"e_1_3_2_1_19_1","first-page":"1","volume-title":"USENIX","author":"King S. T.","year":"2005","unstructured":"S. T. King , G. W. Dunlap , and P. M. Chen . Debugging operating systems with time-traveling virtual machines . In USENIX , pages 1\u2013 1 , 2005 . S. T. King, G. W. Dunlap, and P. M. Chen. Debugging operating systems with time-traveling virtual machines. In USENIX, pages 1\u20131, 2005."},{"key":"e_1_3_2_1_20_1","first-page":"158","volume-title":"CHI","author":"Ko A. J.","year":"2004","unstructured":"A. J. Ko and B. A. Myers . Chi . In CHI , pages 151\u2013 158 , 2004 . A. J. Ko and B. A. Myers. Chi. In CHI, pages 151\u2013158, 2004."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1824760.1824761"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979260"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453119"},{"key":"e_1_3_2_1_24_1","volume-title":"Nonparametric Methods in Statistics with SAS Applications","author":"Koresteleva O.","year":"2004","unstructured":"O. Koresteleva . Nonparametric Methods in Statistics with SAS Applications . CRC Press , Boca Raton, FL , 2004 . O. Koresteleva. Nonparametric Methods in Statistics with SAS Applications. CRC Press, Boca Raton, FL, 2004."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-008-9047-6"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2005.28"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321698"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357323"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065014"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414639.2414648"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.28"},{"key":"e_1_3_2_1_32_1","volume-title":"USENIX","author":"Mickens J.","year":"2010","unstructured":"J. Mickens , J. Elson , and J. Howell . Mugshot: Deterministic capture and replay for JavaScript applications . In USENIX , 2010 . J. Mickens, J. Elson, and J. Howell. Mugshot: Deterministic capture and replay for JavaScript applications. In USENIX, 2010."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642991"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31753-8_18"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.23"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693121"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080695.1069994"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178477"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.83"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568257"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083251"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"e_1_3_2_1_43_1","first-page":"276","volume-title":"AAD","author":"Pytlik B.","year":"2003","unstructured":"B. Pytlik , M. Renieris , S. Krishnamurthi , and S. P. Reiss . Automated fault localization using potential invariants . In AAD , pages 273\u2013 276 , September 8 \u201310 , 2003 . B. Pytlik, M. Renieris, S. Krishnamurthi, and S. P. Reiss. Automated fault localization using potential invariants. In AAD, pages 273\u2013276, September 8\u201310, 2003."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2345156.2254104"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2003.1240292"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048119"},{"key":"e_1_3_2_1_47_1","unstructured":"The Selenium Project Selenium WebDriverDocumentation 2012. http:\/\/seleniumhq.org\/docs\/03_webdriver.html\/.  The Selenium Project Selenium WebDriverDocumentation 2012. http:\/\/seleniumhq.org\/docs\/03_webdriver.html\/."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491447"},{"key":"e_1_3_2_1_49_1","volume-title":"USENIX","author":"Srinivasan S. M.","year":"2004","unstructured":"S. M. Srinivasan , S. Kandula , C. R. Andrews , and Y. Zhou . Flashback: A lightweight extension for rollback and deterministic replay for software debugging . In USENIX , 2004 . S. M. Srinivasan, S. Kandula, C. R. Andrews, and Y. Zhou. Flashback: A lightweight extension for rollback and deterministic replay for software debugging. In USENIX, 2004."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273478"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1622176.1622213"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587053"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595705"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.63"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610399"},{"key":"e_1_3_2_1_57_1","unstructured":"https:\/\/stackoverflow.com\/questions\/15166552\/javascriptlottery-game-using-random-numbers-what-is-wrong-withmy-logic.  https:\/\/stackoverflow.com\/questions\/15166552\/javascriptlottery-game-using-random-numbers-what-is-wrong-withmy-logic."},{"key":"e_1_3_2_1_58_1","unstructured":"https:\/\/sourceforge.net\/projects\/schoolmate\/.  https:\/\/sourceforge.net\/projects\/schoolmate\/."},{"key":"e_1_3_2_1_59_1","unstructured":"https:\/\/sourceforge.net\/projects\/timeclock\/.  https:\/\/sourceforge.net\/projects\/timeclock\/."}],"event":{"name":"ESEC\/FSE'15: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Bergamo Italy","acronym":"ESEC\/FSE'15","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2786805.2786846","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2786805.2786846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:21Z","timestamp":1750227381000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2786805.2786846"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,30]]},"references-count":59,"alternative-id":["10.1145\/2786805.2786846","10.1145\/2786805"],"URL":"https:\/\/doi.org\/10.1145\/2786805.2786846","relation":{},"subject":[],"published":{"date-parts":[[2015,8,30]]},"assertion":[{"value":"2015-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}